Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

PYPOT-PYTHON BASED MULTILAYERED HONEYPOT

View through CrossRef
Cyberattacks are becoming more advanced and frequent, making it essential to develop proactive defenses that go beyond traditional security systems. Honeypots play a key role in this space by attracting attackers and studying their behavior in a controlled environment. This project introduces Pypot, a lightweight, agent-less, and Python-based honeypot framework that simulates both SSH and web-based attack surfaces. Designed to be portable and easy to deploy, Pypot can run on any platform that supports Python. It integrates a fabricated Linux shell, a fake CMS-style admin login page, and a real-time dashboard to monitor intrusion attempts and generate alerts. A unique feature of Pypot is its ability to track the geolocation of attacking IP addresses and visualize them on an interactive world map, helping analysts understand global threat distribution. Unlike container-based systems like T-Pot, Pypot avoids dependency-heavy environments, offering a standalone solution with modular components. By combining deception, live logging, alerting, and geospatial analysis, Pypot serves as both an educational tool and a practical defense mechanism. Its flexible architecture allows for future extensions, such as FTP, MySQL, and malware trap modules. In an age where threats constantly evolve, Pypot provides an accessible and insightful way to study and defend against attacker behavior. Keywords: Honeypot, Python, SSH Emulation, Web Honeypot, IP Tracking, Threat Analysis, Geolocation Mapping, Intrusion Detection, Real-time Monitoring.
Title: PYPOT-PYTHON BASED MULTILAYERED HONEYPOT
Description:
Cyberattacks are becoming more advanced and frequent, making it essential to develop proactive defenses that go beyond traditional security systems.
Honeypots play a key role in this space by attracting attackers and studying their behavior in a controlled environment.
This project introduces Pypot, a lightweight, agent-less, and Python-based honeypot framework that simulates both SSH and web-based attack surfaces.
Designed to be portable and easy to deploy, Pypot can run on any platform that supports Python.
It integrates a fabricated Linux shell, a fake CMS-style admin login page, and a real-time dashboard to monitor intrusion attempts and generate alerts.
A unique feature of Pypot is its ability to track the geolocation of attacking IP addresses and visualize them on an interactive world map, helping analysts understand global threat distribution.
Unlike container-based systems like T-Pot, Pypot avoids dependency-heavy environments, offering a standalone solution with modular components.
By combining deception, live logging, alerting, and geospatial analysis, Pypot serves as both an educational tool and a practical defense mechanism.
Its flexible architecture allows for future extensions, such as FTP, MySQL, and malware trap modules.
In an age where threats constantly evolve, Pypot provides an accessible and insightful way to study and defend against attacker behavior.
Keywords: Honeypot, Python, SSH Emulation, Web Honeypot, IP Tracking, Threat Analysis, Geolocation Mapping, Intrusion Detection, Real-time Monitoring.

Related Results

Basic and Advance: Phython Programming
Basic and Advance: Phython Programming
"This book will introduce you to the python programming language. It's aimed at beginning programmers, but even if you have written programs before and just want to add python to y...
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
Localisation of Attacks, Combating Browser-Based Geo-Information and IP Tracking Attacks
<p>Accessing and retrieving users’ browser and network information is a common practice used by advertisers and many online services to deliver targeted ads and explicit impr...
HONEYPOT: Intrusion Detection System
HONEYPOT: Intrusion Detection System
The number of computers connecting to the internet is getting increased day by day, while the number of computers connected is increasing then it is obvious that the amount of netw...
A Survey on SmartPhone Honeypot
A Survey on SmartPhone Honeypot
Smartphones are becoming   a dominant form of mobile computing in the world. The Smartphone, as a platform, blends a traditional general computing platform with a specialized mob...
Python in proteomics
Python in proteomics
Python is a versatile scripting language that is widely used in industry and academia. In bioinformatics, there are multiple packages supporting data analysis with Python that rang...
Overview of Honeypot Security System for E-Banking
Overview of Honeypot Security System for E-Banking
This paper presents a proactive defense scheme based on Honeypot security system (HPSS). We propose an improved approach based on Intruder Detector System (IDS) which enhances the ...
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
IMPLEMENTASI HONEYPOT DAN PORT KNOCKING DALAM MENDETEKSI SERANGAN DDoS ATTACK PADA SERVER JARINGAN
Sistem keamanan jaringan semakin hari kian makin berkembang, begitu pula serangan pada sistem jaringan yang berbeda-beda metode dan perkembangannya, khususnya pada server yang menj...
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
Classification of botnet attacks in IoT smart factory using honeypot combined with machine learning
The Industrial Revolution 4.0 began with the breakthrough technological advances in 5G, and artificial intelligence has innovatively transformed the manufacturing industry from dig...

Back to Top